{"id":332,"date":"2016-12-11T13:51:49","date_gmt":"2016-12-11T18:51:49","guid":{"rendered":"http:\/\/smartalertz.services\/?p=332"},"modified":"2020-12-10T17:33:58","modified_gmt":"2020-12-10T22:33:58","slug":"ransomware-a-growing-threat-to-small-business","status":"publish","type":"post","link":"https:\/\/bigheadwebhost.com\/2016\/12\/ransomware-a-growing-threat-to-small-business\/","title":{"rendered":"\u2018RANSOMWARE\u2019 A GROWING THREAT TO SMALL BUSINESS"},"content":{"rendered":"

By Ruth Simon \u2022 WSJ \u2022 4\/15\/15<\/span><\/p>\n

More small businesses are falling victim to \u201cransomware,\u201d in which malicious code locks up computer files and cybercriminals demand a ransom to free them.<\/p>\n

Mark Stefanick, president of a small Houston-based firm, Advantage Benefits Solutions, was shocked when one of his consultants suddenly found his work computer locked. Within hours, rogue computer code had spread from the consultant\u2019s computer to the server and backup system at the firm. The code encrypted the claims information and financial data.<\/p>\n

A ransom note popped up on the infected computer: Pay $400 within 72 hours to unlock the data.<\/p>\n

Mr. Stefanick\u2019s first thought was to ignore the ransom demand and regain access to the files on his own. But then his firm\u2019s IT provider said it would take \u201cthousands and thousands of hours of running software\u201d to try to break the code on the encryption.<\/p>\n

\u201cThey set the ransom so low that, as violated as I feel and as much as I wanted to fight, at the end of the day I realized I can pay and get back to work,\u201d he said.<\/p>\n

To recover Advantage\u2019s data, Natalie Stefanick, marketing manager for her father\u2019s company, drove to a nearby Walgreens, pulled a MoneyGram gift card off a rack and asked the cashier to load $400. Within 30 minutes, a program that unencrypted the data began to run.<\/p>\n

In the end, no data was stolen and there were \u201cno confidentiality breaches,\u201d according to Mr. Stefanick. It was about 72 hours before the company was fully back and running and about two weeks before everything was put back where it belonged, he added.<\/p>\n

About 30% of ransomware victims pay to regain their data, estimates Tom Kellermann, chief cybersecurity officer for Trend Micro Inc., an Irving, Texas, cybersecurity firm.<\/p>\n

Intel Security, a unit of Intel Corp., said it reviewed more than 250,000 new ransomware samples in the fourth quarter of 2014, up 155% from the previous quarter. And the Internet Crime Complaint Center, a partnership between the FBI and the nonprofit National White Collar Crime Center, said businesses and individuals submitted 2,275 ransomware complaints from June 1, 2014, to March 31 of this year, with reported losses totaling more than $1.1 million. Ransomware can target more than 230 different types of computer files, up from 70 in 2013, according to Bromium Inc., a Cupertino, Calif., an information-security firm.<\/p>\n

Michael W. Cocanower, owner of itSynergy, an IT consulting firm in Arizona that works with many small businesses, says he has seen a resurgence of ransomware in the past three to six months. He tells clients that the first step is to disconnect the infected computer from their network immediately. The infected computer must also be scrubbed and other computers need to be checked as well.<\/p>\n

One of Mr. Cocanower\u2019s customers, CoValence Inc., a Chandler, Ariz., maker of private-label skin-care products with roughly 100 employees, has been hit with four ransomware attacks in the past six months. A backup system prevented the loss of data, but the attacks \u201ccaused a lot of anxiety,\u201d says John Dennison, the company\u2019s IT manager.<\/p>\n

After the last attack, CoValence upgraded its Internet security protections. It also now regularly reminds employees to be on the lookout for fraudulent email.<\/p>\n

Small businesses can be particularly vulnerable because they often have less sophisticated computer defenses. Some 80% of small and medium-size businesses don\u2019t use data protection and less than half use email security, according to Intel Security. Overall, 23% of recipients open phishing messages used to transmit ransomware and other malware, according to a data-breach report released Wednesday by Verizon Enterprise Solutions, a unit of Verizon Communications Inc. An estimated 11% click on the attachments, according to Verizon.<\/p>\n

Related<\/em><\/h4>\n

Cybercriminals will exploit vulnerabilities in new technology as they figure out how to make money from such activities, a group of security experts tell the WSJ.<\/p>\n

Cybercriminals have made it possible for fraudsters with few, if any, coding skills to launch attacks that lock up computer systems at small businesses, among other targets. Some groups of cybercriminals sell \u201cexploit kits,\u201d invisible Web applications that deliver ransomware and other malware. Other criminals peddle payloads, the malware used to lock up files, or obfuscation services that make malware more difficult to detect.<\/p>\n

Cybercriminals may rent out exploit kits for $150 a week or $500 a month, or license them out. A cybercriminal can earn roughly $84,000 a month on a $5,900 investment in an exploit kit and other tools, estimates Ziv Mador, vice president of security research at Trustwave Holdings Inc.<\/p>\n

To boost response rates, cybercriminals sometimes offer a \u201cfreemium\u201d service, decrypting one or a few randomly selected files at no charge, he adds. Many schemes double the price of decryption after a couple of days to create a sense of urgency.<\/p>\n

Bitcoin is a preferred method of payment, partly because the use of bitcoin makes payments difficult to track.<\/p>\n

As with many computer viruses, ransomware often begins with a fraudulent email.<\/p>\n

Kevin Simpson, co-founder of RSFLA Inc., a Santa Monica-based commercial real-estate firm, was waiting for documents from a client last year, when he clicked on an email with an attachment that appeared to come from Federal Express. Within hours, a virus encrypted RSFLA\u2019s data, shared folders used by the company and its clients, and a year\u2019s worth of Mr. Simpson\u2019s photographs. He says he refused to give in to the $500 ransom, a decision made easier because most of the locked-up files were backed up in the cloud or archived.<\/p>\n

\u201cTo get all those photos, it would have been worth it, but it was on principle that I decided not to pay,\u201d he says. RSFLA was offline for two days and spent at least 10 hours recovering its data, he adds.<\/p>\n","protected":false},"excerpt":{"rendered":"

By Ruth Simon \u2022 WSJ \u2022 4\/15\/15 More small businesses are falling victim to \u201cransomware,\u201d in which malicious code locks up computer files and cybercriminals […]
<\/i> Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/posts\/332"}],"collection":[{"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":5,"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":1367,"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/posts\/332\/revisions\/1367"}],"wp:attachment":[{"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigheadwebhost.com\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}